Virus,Worm,Trojan,Backdoor & Antivirus-Malware and Security
4.4 (37 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
244 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Virus,Worm,Trojan,Backdoor & Antivirus-Malware and Security to your Wishlist.

Add to Wishlist

Virus,Worm,Trojan,Backdoor & Antivirus-Malware and Security

Basic to intermediate level course for IT Security aspirants
4.4 (37 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
244 students enrolled
Created by infySEC Global
Last updated 7/2016
English
Price: $50
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand the characteristics, behaviour and purpose of malware
  • Know the architecture of malware.
  • Learn how to create malware.
  • Learn how to remove malware.
  • Learn how an antivirus detects malware.
  • Learn how to bypass an antivirus.
View Curriculum
Requirements
  • This course includes all the material required either as video or as a downloadable link hence there is no pre required materials or softwares for this course.
  • No prior training is required to take this course as we will start with the basics.
  • We welcome anyone with a thirst for learning
Description

Hi, welcome to our Malware and security course.

In this course, we will teach you how Virus, worm, Trojan and backdoor based attacks are performed in a simulated/test environment in an ethical way. This course helps the security professional to mitigate these attacks using the recommended solution at the end of relevant module.

We have designed this course to enable those aspiring to enter the information security field to learn core concepts on malware in order to safeguard a system security. By the end of this course, you will be familiar with how various types of malware attacks are performed and you will be fully equipped to test and safeguard a system security against various real-time attack vectors.

This course has been specifically designed by a team of information security researchers who are acknowledged experts in their field.

This course has been designed to accelerate your learning process through the use of creative animations and easy to understand voice over narratives. Complex hacking concepts have been broken down into easy to understand modules.

Together, our team will walk you through the entire learning process step by step.

This course is perfect for anybody who is passionate about developing their skills in the field of internet security. No prior training is required to take this course as we will start with the basics. We welcome anyone with a thirst for learning.

We look forward to having you join us. In the meantime, please feel free to take a look at our demo tutorial and exercise before you purchase the full course.

Who is the target audience?
  • The course covers ground basics about malware, hence student with no prior knowledge about malwares can opt for this course.
  • This course is perfect for existing system, network and web administrators as well as anybody who is passionate about developing their skills in the field of information security.
  • We have designed this course to enable those aspiring to enter the information security field to learn core concepts about malwares.
  • Very rarely this course consist of software codes, however those codes are explained in a detailed manner. Hence one shouldn't bother about prior coding knowledge.
  • By the end of this course you will be familiar with how various types of malwares work and you will be fully equipped to test system based infrastructure against various real time attack vectors.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Malware - Wide threat faced by the common man.
2 Lectures 02:43

Malware is the biggest threat facing anyone connected to the world wide web today.. In this course we will educate you on the different types of malware, how they work and also empower you to prevent an infection on your own system or network

Preview 00:39

In this unit of the series we will give you an introduction into what a malware is and discuss the various types out there.

Preview 02:04

Introduction
3 questions
+
Virus
5 Lectures 09:22

Here you will learn more about viruses. These are  a malicious piece of code, each with their own characteristics that are exhibited by their different components.

Preview 01:33

This unit will cover everything from the initial planning stages of the attacker, through coding to the final infection of a system.

Preview 02:02

In this unit, we will explain how to disguise your malicious code so that the victim’s system believes that the file is benign.

Making the Virus appear benign
01:11

Transmission – Phase 2:

This unit will explore the various ways in which the Virus can be transmitted to the victim’s system.

Triggering – Phase 3:

Now that the file has been successfully transmitted, the file must be triggered to open and execute its malicious coding.

Transmission and Triggering – Phase 2&3
02:35

Here we will explain the code of the virus as well the role that the infection phase plays in disrupting the system.

Infection - Phase 4 and 'The code'
02:01

Virus
6 questions
+
Worm
6 Lectures 08:53

An introduction into the next variant of malware – A Worm

Preview 01:03

Starting from the very phase of getting coded by an attacker to the phase of how it infects a system is dealt in this unit of the series. Here it is started from the first phase Creation.

Life cycle of a Worm - Phase 1
01:47

Watch out this unit for the difference in the second phase of virus and the worm.

Propagation Vs Transmission
00:36

This unit deals with the next three phases of the Worm.

Propagation, Triggering and Infection, Phase 2,3 and 4
01:11

This unit of the series narrates how the code used plays its role in disrupting the system.

‘The code’
02:44

Based on the infection the worm can be classified into many different types which is explained in this unit of the series.

Types of Worm - Identification - Phase 5
01:32

Worm
2 questions
+
Trojan
9 Lectures 11:10

An introduction into the next variant of malware – Trojan is dealt in this unit of the series.

Preview 01:55

Starting from the very phase of getting coded by an attacker to the phase of how it infects a system is dealt in this unit of the series. Creating a Trojan using a code is narrated here.

Life cycle of a Trojan - Phase 1
01:58

This unit of the series deals with how a Trojan can be created using a tool.

Creation using tool – Phase 1
00:54

This unit deals with the next two phases of the Trojan.

Transmission and Triggering - Phase 2 and 3
00:28

This unit of the series narrates how infection happens in the system.

Infection - Phase 4
00:48

This unit of the series narrates how the code used plays its role in disrupting the system.

‘The code’
00:53

Based on the infection the Trojan can be classified into many different types which is explained in this unit of the series.

Types of Trojan
01:52

This unit of the series lets you know how the system can be diagnosed whether infected or not.

Identification – Phase 5
00:23

The final phase of the lifecycle of a Virus, Worm and the Trojan are one and the same. This unit of the series deals with how this can be done.

Removal – Phase 6
01:59

Trojan
3 questions
+
Backdoor
7 Lectures 12:45

An introduction into the next variant of malware – Backdoor is dealt in this unit of the series.

Preview 00:55

A backdoor when created for a legal purpose becomes a Conventional backdoor. This unit of the series narrates an example of the same.

Conventional Backdoor
01:57

This unit of the series narrates different variants of illegal backdoors.

Unconventional Backdoor
01:39

This unit of the series deals with the different phases involved in creation, execution and infection of a Legal Backdoor.

Phases of a conventional backdoor
02:41

This unit of the series deals with the different phases involved in creation, transmission, triggering and infection of an illegal Backdoor.

Phases of an unconventional Backdoor
02:25

This unit of the series deals with the different phases involved in creation, execution and infection of a Backdoor in XP machine.

Backdoor – on an XP machine
02:00

This unit of the series deals with how to identify the existence of a backdoor in a machine and remove it.

Removal of a backdoor
01:08

Backdoor
3 questions
+
Anti-Virus
8 Lectures 13:31

This episode of the series deals with the components that are part of the AV for identifying and safeguarding the system.

Components of AV
02:02

This episode of the series shows how the AV works in two different stages to differentiate innocent and malicious files.

2 stage AV working
01:54

Virus Lab
02:10

The functionality of an AV can be checked either at the client side or at the vendor cloud. This part explains how it is done at the vendors cloud.

Checking the AV functionality
00:59

Even though the AV industry is working day and night to keep themselves up to date to catch hold of malicious activities in a system, attackers find ways to dodge them.

Dodging the AV
02:14

This part of the series deals with how it can be done by File Encoding - Encoding a Malicious File.

File Encoding
01:13

This part of the series covers the evolving technologies used in an AV industry.

Current Working arenas in Antivirus
01:54
About the Instructor
infySEC Global
4.3 Average rating
654 Reviews
8,741 Students
8 Courses
Head - Cyber Security Research

I head the academia and industry relations in  infySEC. I am also the director at infySEC .Early from the late 90's, I have been always passionate about computer, espically games which eventually had got interest to learn how computers work, such as application , debugging, disassembling, compiling,etc., with time, the same interest got towards networking, like how packets communicate, how data gets transferred,bandwidth , then got lil into wireless and eventually turning back prooved me i was not anywhere but a lovely apt domain called 'Security', i feel i have been travelling in a very interesting path from where i have started, i would certainly urge everyone of us to try it experience it, its not jus the knowledge but its fun, and yea for me i have miles to go myself.

After 14 years I have turned to focus my efforts on training how attackers hack systems and also started to help them understand how to secure ourselves against such attacks. I decided to teach all that i have learnt over the period of 15 years in form of few videos, which effectively means i teach all that 15 years to you in a week...  My instruction is very actionable with live demos and hands on, Also i share lab exercises which will enable you not just to read but impliment what you have learnt, I want students to take the knowledge they gain and start using it to make money or do what they choose to do with it (ofcourse only ethical ones). 

In 2013, I along with my team at infySEC, stuck the World Record for conducting the largest and longest ethical hacking Marathon with over 9000+ participants assembled in one location, check us on youtube for reference.

My expectations soon after my graduation about IT company's were shattered :D , afterall they say, you are what your company is.My fellow colleagues and team mates were working for money, i was desperate and searching for some like minded in computers, but again, its been 5 yrs i have been working for Multi national companies, and now i have got full time freelancing, afterall there is no one to question your time restriction of work, domain of work, etc..,You are master of your fate, and captain of your soul.... Live the life you have imagined :D

You will find my teaching style is well liked by my students and they are always looking for new and exciting courses from me.

Harry The Boss - Rating: 5 out of 5
I highly recommend infysec to everyone.I joined the training with absolutely no prior experience in ethical hacking....When I attended a training..It was revelation..The fluidity and crisp and clear understanding of trainer was showing...No jargons.  In fact he made a very complex phenomenon very simple to comprehend. I gained much more than expectations.... The trainer was master in his subject knowledge...With answers to any questions shooting at him....

Stacie Stalcup - Rating: 5 out of 5
I enjoy the animation. No matter what computer course Infysec offers, I will most likely take it because of how the subject matter is taught and presented. We aren't forced to look at someone reading powerpoints or watching someone talking into the camera which makes me sleepy and becomes boring. There is no dull PowerPoint here; Instead, InfySEC animates the techniques and after the lessons provide step by step exercises. I wish all Udemy classes were taught this way.

Dominik Koszkul - Rating: 5 out of 5
This course quickly shows what are dangers in web. Great for beginners to realize how to write the web applications and secure the servers against attackers

Raymundo Torres - Rating: 5 out of 5
This instruction video was great. Just stuck to the material and explained it thoroughly with visual images and examples. This video inspired me to start a smalll training program for my fellow colleagues. Thanks!

Diana Carolina Gómez  - Rating: 5 out of 5
Because the explanations have simple examples and close to reality. This helps to recognize and understand the content of the course easier.

Miteshkumar Joshi -  Rating: 5 out of 5
Having some knowledge on HTTP, this course is suitable for me and clearly defines some areas where I was findling it diffculty.

Come , lets togather make the world a secure place to live in !